Metadata-Version: 2.4
Name: cve-mcp-server
Version: 0.4.0
Summary: A Model Context Protocol server providing tools for CVE vulnerability information queries
License-File: LICENSE
Requires-Python: >=3.12
Requires-Dist: dotenv>=0.9.9
Requires-Dist: mcp>=1.7.0
Requires-Dist: pytest>=8.3.5
Requires-Dist: requests>=2.32.3
Description-Content-Type: text/markdown

# CVE MCP Server

A Model Context Protocol server providing CVE vulnerability information query capabilities. This server enables LLMs to query detailed information for specific CVE IDs, retrieving data from MITRE's CVE database.

### Available Tools

- `query_cve` - Query vulnerability information by CVE ID
  - Required parameters:
    - `cve_id` (string): The CVE identifier (e.g., 'CVE-2021-44228', 'CVE-2023-34362')

## Install
```bash
pip install cve-mcp-server
```

## Configuration
### stdio (default)
```json
{
  "mcpServers": {
    "CVE": {
      "command": "uvx",
      "args": [
        "cve-mcp-server"
      ]
    },
  }
}
```

### SSE
Run SSE Server
```bash
uvx cve-mcp-server sse
```
Use the following configuration to connect directly:
```json
{
    "mcpServers": {
        "amap-mcp-server": {
            "url": "http://localhost:9999"
        }
    }
}
```

## Debugging

You can use the MCP inspector to debug the server:

```bash
npx @modelcontextprotocol/inspector python -m cve-mcp-server
```

## License

cve-mcp-server is licensed under the MIT License. This means you are free to use, modify, and distribute the software, subject to the terms and conditions of the MIT License. For more details, please see the LICENSE file in the project repository.